Disable "Network Location Awareness (NLA)" service (breaks auto-reconnect, connectivity status, network identification)
- Windows onlyThis script improves your privacy on Windows
- Single actionThis page belongs to a script, containing basic changes to achieve a task.
- Impact: High
System Functionality / Data Loss Risk: High
This action improves privacy with high impact when you run the recommended script.
- Batch (batchfile)These changes use Windows system commands to update your settings.
- Administrator rights requiredThis script requires privilege access to do the system changes
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
This script disables the Network Location Awareness (NLA) service.
NLA collects and stores network configuration information and notifies programs of changes 1 2 3 4 5 6. This data collection can pose privacy concerns. It determines network connectivity type and properties, helping Windows manage connections 7 8. NLA uses the Network Connectivity Status Indicator (NCSI) to assess internet connectivity 7 9. NCSI is responsible for detecting Internet connectivity status 9.
Key functions of NLA:
- Generates unique identifiers (GUIDs) for each network interface 6 10
- Interacts with Windows Firewall to apply appropriate rules based on network profiles 10
- Provides connectivity status for various applications such as Microsoft Teams and Windows Update 8
Benefits of disabling NLA:
- Enhances privacy by stopping communication with Microsoft servers for connectivity detection (NCSI) 7 8 9 11
- Increases security by reducing potential vulnerabilities 12 13
- Reduces background processes, potentially optimizing system performance 4 15
Microsoft considers this service 'OK to disable' to reduce data collection and optimize system performance 4. Disabling NLA does not impact the essential operations of the operating system 14. Citrix recommends disabling it on VDI/RDS machines 15.
Side effects of disabling NLA:
- Lack of network configuration information 1 2 3 4 5 11
- Failure of related services on Windows 10 such as
Dhcp
,nsi
,RpcSs
,Tcpip
EventLog
andnetprofm
2 3 - Issues with network identification (such as "Home", "Work", "Public") and firewall profile determination 10
- Broken internet connectivity status detection and network status alerts 7 9
- Problems with captive portal (hotspot) detection 11
- Difficulties with the auto-reconnect functionality of different apps 6 14 16
This may lead to:
- Lack of immediate feedback on network status.
- Potential functionality issues in the system and applications that rely on NCSI for network information.
- Reduced ability of Windows and other components to determine internet connectivity.
- Windows and other software may incorrectly report that you're offline.
- Issues with automatically opening the sign-in page when a captive portal (hotspot) is detected.
Overview of default service statuses
This service runs and starts by default on Windows 10 2 3 but not on Windows 11 1. NLA service is available on both Windows 10 2 3 and Windows 11 1, but its NCSI functionality applies to Windows 10 and Windows Server 2019 and earlier versions 11. Its functionality has been replaced by Network List Service (NLS) on Windows 11 and Windows Server 2022 and later 8 11. This script does not disable this service on Windows 11 as it no longer manages NCSI and offers no clear privacy benefit. This script targets Windows 10, where disabling NLA enhances privacy by preventing NCSI functionality.
OS Version | Status | Start type |
---|---|---|
Windows 10 (≥ 22H2) | 🟢 Running | Automatic |
Windows 11 (≥ 23H2) | 🔴 Stopped | Manual |
This script should only be used by advanced users.
This script is not recommended for daily use as it breaks important functionality.
Consider creating a system restore point before doing any changes.
Sources
- Network Location Awareness - Windows 11 Service - batcmd.com. batcmd.com. (2024).
Original: https://batcmd.com/windows/11/services/nlasvc
Archived: https://web.archive.org/web/20240810075341/https://batcmd.com/windows/11/services/nlasvc/ - Network Location Awareness - Windows 10 Service - batcmd.com. batcmd.com. (2024).
Original: https://batcmd.com/windows/10/services/nlasvc
Archived: https://web.archive.org/web/20240520132332/https://batcmd.com/windows/10/services/nlasvc/ - Network Location Awareness (NlaSvc) Service Defaults in Windows 10. revertservice.com. (2024).
Original: https://revertservice.com/10/nlasvc
Archived: https://web.archive.org/web/20240113010240/https://revertservice.com/10/nlasvc/ - Guidance on disabling system services on Windows IoT Enterprise. Microsoft Learn. (2023).
Original: https://learn.microsoft.com/en-us/windows/iot/iot-enterprise/optimize/services
Archived: https://web.archive.org/web/20230905120815/https://learn.microsoft.com/en-us/windows/iot/iot-enterprise/optimize/services - Security guidelines for system services in Windows Server 2016. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server
Archived: https://web.archive.org/web/20240218231654/https://learn.microsoft.com/en-us/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server#network-location-awareness - The Role of NLA - Win32 apps. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows/win32/winsock/the-role-of-nla-2
Archived: https://web.archive.org/web/20240809205224/https://learn.microsoft.com/en-us/windows/win32/winsock/the-role-of-nla-2 - An Internet Explorer or Edge window opens when your computer connects to a corporate network or a public network - Windows Client. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/troubleshoot/windows-client/networking/internet-explorer-edge-open-connect-corporate-public-network
Archived: https://web.archive.org/web/20240620094739/https://learn.microsoft.com/en-us/troubleshoot/windows-client/networking/internet-explorer-edge-open-connect-corporate-public-network - Network Connection Status Indicator (NCSI) troubleshooting guidance - Windows Server. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/troubleshoot-ncsi-guidance
Archived: https://web.archive.org/web/20240722112607/https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/troubleshoot-ncsi-guidance - The Network Connection Status Icon - Microsoft Enterprise Networking Team - Site Home - TechNet Blogs. blogs.technet.com. (2012).
Original: http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx
Archived: https://web.archive.org/web/20121226172641/http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx - Network Location Awareness (NLA) and how it relates to Windows Firewall Profiles - Microsoft Enterprise Networking Team - Site Home - TechNet Blogs. blogs.technet.com. (2012).
Original: http://blogs.technet.com/b/networking/archive/2010/09/08/network-location-awareness-nla-and-how-it-relates-to-windows-firewall-profiles.aspx
Archived: https://web.archive.org/web/20121103135524/http://blogs.technet.com/b/networking/archive/2010/09/08/network-location-awareness-nla-and-how-it-relates-to-windows-firewall-profiles.aspx - Network Connectivity Status Indicator FAQ for Windows. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows-server/networking/ncsi/ncsi-frequently-asked-questions
Archived: https://web.archive.org/web/20240114123854/https://learn.microsoft.com/en-us/windows-server/networking/ncsi/ncsi-frequently-asked-questions - NVD - CVE-2020-1437. nvd.nist.gov. (2024).
Original: https://nvd.nist.gov/vuln/detail/CVE-2020-1437
Archived: https://web.archive.org/web/20240809205000/https://nvd.nist.gov/vuln/detail/CVE-2020-1437 - CVE - CVE-2015-0006. cve.mitre.org. (2024).
Original: https://cve.mitre.org/cgi-bin/cvename.cgi
Archived: https://web.archive.org/web/20240809205115/https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0006 - How do these Windows services affect the security of Windows Firewall? - Information Security Stack Exchange. security.stackexchange.com. (2024).
Original: https://security.stackexchange.com/questions/15466/how-do-these-windows-services-affect-the-security-of-windows-firewall
Archived: https://web.archive.org/web/20240809205040/https://security.stackexchange.com/questions/15466/how-do-these-windows-services-affect-the-security-of-windows-firewall - Citrix Optimizer Report. jans.cloud. (2024).
Original: https://jans.cloud/wp-content/uploads/2017/12/Execute_History.html
Archived: https://web.archive.org/web/20240809205236/https://jans.cloud/wp-content/uploads/2017/12/Execute_History.html - Checking Availability Before Attempting Use. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/previous-versions/windows/desktop/mpc/checking-availability-before-attempting-use
Archived: https://web.archive.org/web/20240809205207/https://learn.microsoft.com/en-us/previous-versions/windows/desktop/mpc/checking-availability-before-attempting-use
Apply Now
Choose one of three ways to apply:
Download script
Download and run the script directly- No app needed
- Offline usage
- Easy-to-apply
- Free
- Open-source
Help
How to apply or restore "Disable "Network Location Awareness (NLA)" service (breaks auto-reconnect, connectivity status, network identification)" using script
- ≈ 2 min to complete
- Tools: Web Browser
- Difficulty: Simple
- ≈ 5 instructions
- 1
Download
Download the script file by clicking on thebutton above.
Use button above to restore changes. - 2
Keep the file
If warned by your browser, keep the file. - 3
Open
Open the downloaded file. - 4
Exit
Once it's done, press any key to exit the window. - 5
Restart
Restart your computer for all changes to take effect.
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Free
- Open-source
- Popular
- Offline/Online usage
Help
How to apply or restore "Disable "Network Location Awareness (NLA)" service (breaks auto-reconnect, connectivity status, network identification)" using privacy.sexy
- ≈ 3 min to complete
- Tools: privacy.sexy
- Difficulty: Simple
- ≈ 4 instructions
- 2
Choose script
- Search for the script name: Disable "Network Location Awareness (NLA)" service (breaks auto-reconnect, connectivity status, network identification)
- Check the script by clicking on the checkbox.
- 3
Run
Click on ▶️ Run button at the bottom of the page.This button only appears on desktop version (recommended). On browser, use 💾 Save button.
- Apply
- Revert
:: Disable service(s): `NlaSvc`
:: This operation will not run on Windows versions later than Windows10-MostRecent.
PowerShell -ExecutionPolicy Unrestricted -Command "$versionName = 'Windows10-MostRecent'; $buildNumber = switch ($versionName) { 'Windows11-21H2' { '10.0.22000' }; 'Windows10-MostRecent' { '10.0.19045' }; 'Windows10-22H2' { '10.0.19045' }; 'Windows10-1909' { '10.0.18363' }; 'Windows10-1903' { '10.0.18362' }; default { throw "^""Internal privacy$([char]0x002E)sexy error: No build for maximum Windows '$versionName'"^""; }; }; $maxVersion=[System.Version]::Parse($buildNumber); $ver = [Environment]::OSVersion.Version; $verNoPatch = [System.Version]::new($ver.Major, $ver.Minor, $ver.Build); if ($verNoPatch -gt $maxVersion) { Write-Output "^""Skipping: Windows ($verNoPatch) is above maximum $maxVersion ($versionName)"^""; Exit 0; }; $serviceName = 'NlaSvc'; Write-Host "^""Disabling service: `"^""$serviceName`"^""."^""; <# -- 1. Skip if service does not exist #>; $service = Get-Service -Name $serviceName -ErrorAction SilentlyContinue; if(!$service) { Write-Host "^""Service `"^""$serviceName`"^"" could not be not found, no need to disable it."^""; Exit 0; }; <# -- 2. Stop if running #>; if ($service.Status -eq [System.ServiceProcess.ServiceControllerStatus]::Running) { Write-Host "^""`"^""$serviceName`"^"" is running, stopping it."^""; try { Stop-Service -Name "^""$serviceName"^"" -Force -ErrorAction Stop; Write-Host "^""Stopped `"^""$serviceName`"^"" successfully."^""; } catch { Write-Warning "^""Could not stop `"^""$serviceName`"^"", it will be stopped after reboot: $_"^""; }; } else { Write-Host "^""`"^""$serviceName`"^"" is not running, no need to stop."^""; }; <# -- 3. Skip if already disabled #>; $startupType = $service.StartType <# Does not work before .NET 4.6.1 #>; if (!$startupType) { $startupType = (Get-WmiObject -Query "^""Select StartMode From Win32_Service Where Name='$serviceName'"^"" -ErrorAction Ignore).StartMode; if(!$startupType) { $startupType = (Get-WmiObject -Class Win32_Service -Property StartMode -Filter "^""Name='$serviceName'"^"" -ErrorAction Ignore).StartMode; }; }; if ($startupType -eq 'Disabled') { Write-Host "^""$serviceName is already disabled, no further action is needed"^""; Exit 0; }; <# -- 4. Disable service #>; try { Set-Service -Name "^""$serviceName"^"" -StartupType Disabled -Confirm:$false -ErrorAction Stop; Write-Host "^""Disabled `"^""$serviceName`"^"" successfully."^""; } catch { Write-Error "^""Could not disable `"^""$serviceName`"^"": $_"^""; }"
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
Help
How to apply or restore "Disable "Network Location Awareness (NLA)" service (breaks auto-reconnect, connectivity status, network identification)" using commands
- ≈ 2 min to complete
- Tools: Command Prompt
- Difficulty: Medium
- ≈ 3 instructions
- 1
Open Command Prompt
Open Command Prompt as Administrator. - 2
Copy code
Copy the code: - 3
Paste & run
Paste the commands into Command Prompt and press Enter to run.Some changes require a system restart to take effect
Similar Guides
Wider Goal
Guides below includes this guide to achieve a wider goal.See other more general settings that includes this one as one of its actions.
These plans combine multiple privacy settings, including this one, for stronger protection.
- Disable connectivity checks
- Disable OS data collection
This category contains scripts that disable various connectivity checks performed by Windows. Connectivity checks allow Windows to assess network status and qualit...
Disable OS data collection — to reduce data exposure leveraging important data privacy safeguard on Windows. What follows is, this guidance provides instructions t...
Same Goal
Other guides in Disable connectivity checksSee settings that are in the same category as this guide.
Using other actions in the same category may help you achieve your goal better.
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
History
We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.